Kaseya VSA Ransomware Attack: A Bombshell Supply-Chain Hit
What happened? During the weekend of July 4th, 2021, Kaseya VSA and multiple managed service providers (MSPs) were brutally hit by a supply-chain ransomware attack. Kaseya provides technology that helps other companies ...
Kaseya VSA Ransomware Attack: A Bombshell Supply-Chain Hit
What happened? During the weekend of July 4th, 2021, Kaseya VSA and multiple managed service providers (MSPs) were brutally hit by a supply-chain ransomware attack. Kaseya provides technology that helps other companies ...
White Hat Hacking And CDU | Avast
Earlier this month, a hacker pointed out a security vulnerability in the German Christian Democratic Union (CDU) political party’s election campaign app. The party responded by pressing charges against the hacker. The ...
Don’t Leave Security to the Network
The enterprise network security model as we know it has no future. Networks are now under continual attack and traditional security models are proving to be indefensible. Recent high-profile ransomware attacks on ...
What Is ITIL? Uses, Versions, Certifications and More
What Is ITIL? ITIL or Information Technology Infrastructure Library can be described as a library or a repository of volumesRead More The post What Is ITIL? Uses, Versions, Certifications and More appeared ...
How Faulty Software Development Allows Ransomware to Thrive
And how to prevent ransomware attacksPhoto by NeONBRAND on UnsplashRansomware is making headlines in 2021 due to a string of successful attacks against high-profile targets. Ransomware is not a new threat, but the ...
Defining What it Means to Secure Software in Runtime
The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime. Runtime is a vulnerable blind spot deep within the application infrastructure. Today’s cybersecurity tools ...
The Role of Cryptocurrency in Ransomware Attacks
Ransomware attacks are on the rise and have recently been front page news with attacks on the Colonial Pipeline, JBS Food and Kaseya. This ever-evolving malware can encrypt your files and block ...
Bitglass Security Spotlight: Attackers Leverage Microsoft Vulnerabilities and More Ransomware Updates
Here are the top security stories from recent weeks: Microsoft Exchange Servers Getting Attacked by ProxyShell Exploits Ransomware Gangs Using Windows PrintNightmare Vulnerabilities in Attacks Accenture Hit by Ransomware Attack, Data Stolen ...
ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices
TMobile has now issued a formal apology and offered free identity theft recovery services to nearly 48 million customers for whom the telecom giant failed to protect their sensitive personal information. At ...